Skip to main content

Security

Designed for local deployment in controlled environments. Your IT controls access and encryption boundaries.

  • Designed for local deployment.
  • Designed to avoid third-party model training on your request data.
  • Minimizes external service dependence.
  • Supports review and audit workflows.

Deployment

Local deployment

Designed for local deployment in controlled environments, with hardware secured to your IT standards.

Encryption

Key management by your IT

System assets are encrypted at rest, with key strategies managed by your organization.

Compliance

Standards maintained by our team

Supports review and audit workflows for local, offline-capable operations.

Responsible disclosure

Report security issues to [email protected]. Include impact and reproduction details.

Evaluate the offline deployment model

Pilot deployment for regulated or high-trust environments. Hardware and setup included.